Browse Title Index


 
Issue Title
 
Vol 20, No 2 (2019) An Unknown Attack Detection Scheme Based on Semi-supervised Learning and Information Gain Ratio Abstract   PDF
Meng-Fan Xu, Xing-Hua Li, Mei-Xia Miao, Cheng Zhong, Jian-Feng Ma
 
Vol 16, No 4 (2015) Analysis of File Pollution in P2P Networks with Epidemic Model Abstract
Zhong-Wen Li, Kuan-Ching Li, Yi Xie, Hai Jiang, Liang Shi
 
Vol 17, No 7 (2016) Analysis of Hierarchical Addressing in Different Deployment Ways Abstract
Xuan Lu, Wendong Wang, Xiangyang Gong, Xirong Que, Bai Wang
 
Vol 3, No 4 (2002) Analysis of Parallel Query Processing Algorithms for Semi-structured Data Abstract
Wenjun Sun, Kevin Lu
 
Vol 26, No 1 (2025) Analysis of Product Selection Strategy for Cross-Border E-Commerce with Assistance of Artificial Intelligence Abstract
Lin Feng
 
Vol 25, No 3 (2024) Analysis of Reading Behavior Based on Students’ Cognitive Styles and Learning Styles Abstract
Juan Zhou, Hideyuki Takada, Chengjiu Yin
 
Vol 16, No 3 (2015) Analysis of SCTP Concurrent Multipath Transfer in Vehicular Network Communication Abstract
Jing-Yi Gan, Neal Naixue Xiong, Hui-Min Wen, Qing-Zhen Zhu
 
Vol 21, No 4 (2020) Analysis of the New Method for Assessing the Total Network Capacity of Wireless Mesh Networks for IoT Devices Abstract   PDF
El Miloud Ar-Reyouchi
 
Vol 21, No 5 (2020) Analysis on Parking Sharing Capacity Based on Supply-Demand Relationship Abstract   PDF
Weiwei Liu, Chennan Zhang, Hao Sun, Jianming Zhang, Gwang-jun Kim
 
Vol 24, No 3 (2023) Analysis on Risk Awareness Model and Economic Growth of Finance Industry Abstract   PDF
Renyang Wang, Badamasi Sani Mohammed, R. Parthasarathy
 
Vol 17, No 7 (2016) Analytical Model of Adaptive Cross-Layer-Based TCP Congestion Control for Wireless Mobile Cloud Access Abstract
Ben-Jye Chang, Ying-Hsin Liang, Jun-Yu Jin
 
Vol 16, No 1 (2015) Analyzing Distributed Remote Process Execution Using Queuing Model Abstract
Susmit Bagchi
 
Vol 20, No 1 (2019) Analyzing Google Trends with Travel Keyword Rankings to Predict Tourists into a Group Abstract   PDF
Jui-Hung Chang, Chien-Yuan Tseng
 
Vol 11, No 5 (2010) Analyzing Mediated Service Protocol Interactions Considering User's Expectation Abstract
Zhang-Bing Zhou, Han-Chieh Chao, Sami Bhiri, Lei Shu, Manfred Hauswirth
 
Vol 12, No 6 (2011) Analyzing Mediated Service Protocol Interactions Considering User's Expectation Abstract
Zhangbing Zhou, Han-Chieh Chao, Sami Bhiri, Lei Shu, Manfred Hauswirth
 
Vol 24, No 6 (2023) Analyzing the Influence of Internet Usage Behavior on Spectator Sports Consumption Among College Students: An Empirical SEM Study Based on the SOR Model Abstract
Yujie Zhang, Yuyang Hou, Luning Cao, You Xiong, Qian Huang
 
Vol 19, No 1 (2018) Android App Copy Protection Mechanism with Semi-trusted Loader Abstract   PDF
Kuo-Yu Tsai
 
Vol 23, No 6 (2022) Android Malware Application Detection Method Based on RGB Image Features in E-Commerce Abstract   PDF
Xingyu Li, Yongli Tang, Mary Subaja Christo, Zongqu Zhao, Ying Li
 
Vol 3, No 2 (2002) Animation Templates for WAP Abstract
Jyh-Huei Chang
 
Vol 21, No 3 (2020) Anomaly Detection in Crowded Scenes Based on Group Motion Features Abstract   PDF
Shuqiang Guo, Dongxue Li, Lili Yao
 
Vol 25, No 3 (2024) Anomaly Detection Model of Time Segment Power Usage Behavior Using Unsupervised Learning Abstract
Wen-Jen Ho, Hsin-Yuan Hsieh, Chia-Wei Tsai
 
Vol 23, No 4 (2022) Anomaly Detection of Dam Monitoring Data based on Improved Spectral Clustering Abstract   PDF
Lixia Ji, Xiao Zhang, Yao Zhao, Zongkun Li
 
Vol 10, No 3 (2009) Anonymity Scheme for Interactive P2P Services Abstract
Sharon Shitrit, Eyal Felstaine, Niv Gilboa, Ofer Hermoni
 
Vol 15, No 6 (2014) Anonymous Authentication and Key-Agreement Schemes in Vehicular Ad-Hoc Networks Abstract
Cheng-Yeh Chen, Te-Cheng Hsu, Hsin-Te Wu, John Y. Chiang, Wen-Shyong Hsieh
 
Vol 10, No 1 (2009) Anonymous Authentication for Wireless Access in Internet from Pairings Abstract
Shyi-Tsong Wu, Jung-Hui Chiu, Bin-Chang Chieu
 
726 - 750 of 2683 Items << < 25 26 27 28 29 30 31 32 33 34 > >>